BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Optimistik Infosystems - ECPv6.15.17//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Optimistik Infosystems
X-ORIGINAL-URL:https://www.optimistikinfo.com
X-WR-CALDESC:Events for Optimistik Infosystems
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
TZOFFSETFROM:+0530
TZOFFSETTO:+0530
TZNAME:IST
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Asia/Kolkata:20250716T110000
DTEND;TZID=Asia/Kolkata:20250716T170000
DTSTAMP:20260503T050146
CREATED:20250709T010507Z
LAST-MODIFIED:20250709T010516Z
UID:5161-1752663600-1752685200@www.optimistikinfo.com
SUMMARY:Cybersecurity in the Age of GenAI   (How GenAI is reshaping threats—and defenses—in the cyber world)
DESCRIPTION:Agenda (Breakdown) | 0-5 Mins \n\n\n\n\nQuick intro by host\n\n\n\n“What if the next cyberattack wasn’t human-led?”\n\n\n\nPulse poll: Have you used GenAI in your org’s security workflows?The New Threat Landscape | 5-10 Mins\n\n\n\nHow GenAI is being used by cyber attackers\n\n\n\nLive demo: Using ChatGPT or Claude to craft a phishing mail\n\n\n\nReal-world examples: Deepfake fraud\, LLM jailbreaks\, AI-generated malware\n\n\n\n\nGenAI-Driven Defense | 15-25 Mins \n\n\n\n\nHow defenders are leveraging AI\n\n\n\nExamples:o AI-based SIEM & XDRo Automating threat intel with GenAIo LLMs for log analysis\n\n\n\nCase Study: How Microsoft/Google/AWS are doing it\n\n\n\n\nBig Risks We’re Overlooking | 25–35 mins \n\n\n\n\nShadow AI and data leaks\n\n\n\nLLM hallucinations and prompt injection\n\n\n\nRegulatory blind spots (e.g.\, GDPR\, HIPAA with AI use)\n\n\n\nInternal misuse (e.g.\, unintentional data sharing)\n\n\n\n\nDesigned for Lulu Group optimistikinfo.com ver1.1 \n\n\n\nWhat You Should Be Doing Now | 35–45 mins \n\n\n\n\n5 Immediate Actions:\n\n\n\n\n\nDefine a GenAI usage policy\n\n\n\nTrain your cyber team on LLMs\n\n\n\nStart red-teaming with AI\n\n\n\nClassify and protect sensitive prompts\n\n\n\nPrepare your board for GenAI-related incidents\n\n\n\n\nLive Demo or Use Case Spotlight | 45–50 mins \n\n\n\n\nQuick hands-on walkthrough:“How to use an LLM to detect risky code or phishing attempts”\n\n\n\n\nQ&A + Interactive Chat | 50–60 mins \n\n\n\nThrow a challenge: “One thing you’ll do differently tomorrow because of this session?” \n\n\n\nOpen Q&A
URL:https://www.optimistikinfo.com/event/cybersecurity-in-the-age-of-genai-how-genai-is-reshaping-threats-and-defenses-in-the-cyber-world/
END:VEVENT
END:VCALENDAR